Cybersecurity and government
Where are we at with cyber-security in government? An article by Rene Millman in The Guardian[1] stresses that both central and local governments are increasingly at risk of cyber attacks. They should, he notes, be trying to constantly improve their [...]
Understanding the Cyber Threat: A Policy Guide for Legislators.
Ajoint policy declaration of AT&T and the National Cyber Security Alliance published a guide to encourage the development of long-term strategies aimed at increasing cybersecurity awareness among elected officials.They commissioned the Governing Institute (dedicated to helping public sector leaders govern [...]
Challenges in Cyberthreat Detection
During the past few years, cybercrime had a strong presence world-wide judging by the impact of the recorded incidents. The financial damage caused by cybercrime globally is estimated to be about $450 billion and this number is predicted to reach [...]
All warfare is based on deception– Sun Tzu, 544-496 BC
A recent article has drawn our attention on fake news and botnets and about how the web can be weaponised that originally appeared in Das Magazin, Switzerland. While the core subject of the article represents an interesting piece of European [...]
The Soft Systems Methodology in Practice
Today I want to talk a bit about the effectiveness of the system and dependency analysis methodology we have chosen in the CS-AWARE project: the soft systems methodology. More specifically, I would like to talk about the first phase of [...]
Imagining a cybersecurity future supported with grassroots NLP technology innovations
Our UNI Passau team is specialized in Natural Language Processing and Computational Linguistics. Writing our first contribution for this blog is a challenge for us. First of all, we expect that we have to present the context for how NLP [...]
CS-Aware: The First Soft Systems Analysis Workshop
The first of our system dependency and analysis workshops have taken place in Larissa and Rome. As both problem domains are complex socio-technical systems, we are using the Soft Systems approach developed by Peter Checkland to analyse the key systems, [...]
Cyber Trust: The battle continues
We recently had our final seminar of DIMECC Cyber Trust Program (http://cybertrust.fi/cyber-trust-final-result-seminar-on-26-september-in-helsinki/). The program created a foundation for Finnish research and industry to address the needs emerging in the cyber security domain. The main research objective of the program was [...]